Additional Resources
Top Commentators:
- Elliott Abrams
- Fouad Ajami
- Shlomo Avineri
- Benny Avni
- Alan Dershowitz
- Jackson Diehl
- Dore Gold
- Daniel Gordis
- Tom Gross
- Jonathan Halevy
- David Ignatius
- Pinchas Inbari
- Jeff Jacoby
- Efraim Karsh
- Mordechai Kedar
- Charles Krauthammer
- Emily Landau
- David Makovsky
- Aaron David Miller
- Benny Morris
- Jacques Neriah
- Marty Peretz
- Melanie Phillips
- Daniel Pipes
- Harold Rhode
- Gary Rosenblatt
- Jennifer Rubin
- David Schenkar
- Shimon Shapira
- Jonathan Spyer
- Gerald Steinberg
- Bret Stephens
- Amir Taheri
- Josh Teitelbaum
- Khaled Abu Toameh
- Jonathan Tobin
- Michael Totten
- Michael Young
- Mort Zuckerman
Think Tanks:
- American Enterprise Institute
- Brookings Institution
- Center for Security Policy
- Council on Foreign Relations
- Heritage Foundation
- Hudson Institute
- Institute for Contemporary Affairs
- Institute for Counter-Terrorism
- Institute for Global Jewish Affairs
- Institute for National Security Studies
- Institute for Science and Intl. Security
- Intelligence and Terrorism Information Center
- Investigative Project
- Jerusalem Center for Public Affairs
- RAND Corporation
- Saban Center for Middle East Policy
- Shalem Center
- Washington Institute for Near East Policy
Media:
- CAMERA
- Daily Alert
- Jewish Political Studies Review
- MEMRI
- NGO Monitor
- Palestinian Media Watch
- The Israel Project
- YouTube
Government:
Back
(Christian Science Monitor) Mark Clayton - A cyber worm, called Stuxnet, may be the world's first known cyberweapon designed specifically to destroy a real-world target. One expert suggests Stuxnet may have already attacked its target - Iran's Bushehr nuclear power plant. Stuxnet employs amazing new tricks, like taking control of a computer system without the user taking any action or clicking any button other than inserting an infected memory stick. It targets and infiltrates industrial supervisory control and data acquisition (SCADA) software used to run chemical plants and factories as well as electric power plants and transmission systems worldwide, takes control of the automated factory control systems, and does whatever it was programmed to do with them. Ralph Langner, a German cyber-security researcher, described Stuxnet as essentially a precision, military-grade cyber missile deployed to seek out and destroy a real-world target of high importance. "This is a 100% sabotage attack," he said. Three top U.S. industrial control system security experts confirmed his findings. "This is the first direct example of weaponized software, highly customized and designed to find a particular target," says Michael Assante, former chief of industrial control systems cyber security research at the U.S. Department of Energy's Idaho National Laboratory. A geographical distribution of computers hit by Stuxnet found Iran to be the apparent epicenter of the infections. 2010-09-27 08:55:57Full Article
Does New Malware Target Iran's Nuclear Plant?
(Christian Science Monitor) Mark Clayton - A cyber worm, called Stuxnet, may be the world's first known cyberweapon designed specifically to destroy a real-world target. One expert suggests Stuxnet may have already attacked its target - Iran's Bushehr nuclear power plant. Stuxnet employs amazing new tricks, like taking control of a computer system without the user taking any action or clicking any button other than inserting an infected memory stick. It targets and infiltrates industrial supervisory control and data acquisition (SCADA) software used to run chemical plants and factories as well as electric power plants and transmission systems worldwide, takes control of the automated factory control systems, and does whatever it was programmed to do with them. Ralph Langner, a German cyber-security researcher, described Stuxnet as essentially a precision, military-grade cyber missile deployed to seek out and destroy a real-world target of high importance. "This is a 100% sabotage attack," he said. Three top U.S. industrial control system security experts confirmed his findings. "This is the first direct example of weaponized software, highly customized and designed to find a particular target," says Michael Assante, former chief of industrial control systems cyber security research at the U.S. Department of Energy's Idaho National Laboratory. A geographical distribution of computers hit by Stuxnet found Iran to be the apparent epicenter of the infections. 2010-09-27 08:55:57Full Article
Search Daily Alert
Search:
|